CYBERSECURITY

Cloud Security Risk – Malware, Third-Party Plugins, and More

The biannual Netskope Cloud and Threat Report analyses the most interesting trends in the use of cloud services and applications for companies, threats on the web and in the cloud, and migrations and data transfers.

Among the most outstanding conclusions stands out a clear and sustained growth of malware delivered through cloud applications, which now represents 68% of all malware that reaches organizations. 

This increase comes against the continued proliferation of cloud applications at the enterprise level, with adoption increasing 22% during the first six months of 2021. According to the latest research from Netskope, a company with between 500 and 2,000 employees uses an average of 805 different applications and cloud services. 

Of this total, 97% of these applications are “Shadow IT”; they have not been authorized, nor are they covered and protected by corporate IT teams.

However, the use of unauthorized cloud applications is not the only potential threat identified in the report, indicating the need for increased management of authorized cloud applications and IAAS services. Today, more than a third (35%) of all workloads on AWS, Azure, and Google Cloud Platform are “unrestricted,” meaning they are open to public viewing by anyone on the Internet.

The research authors have also identified an emerging attack opportunity in the widespread use (97%) of Google corporate credentials as a convenient shortcut to login into third-party applications. 

When using Google logins as a shortcut, a third-party app asks for several permissions, ranging from “view basic account information” to “view and manage Google Drive files.” Third-party applications that request to view and manage Google Drive files pose a significant threat to corporate data exposure.

“Threat actors strive to stay one step ahead, so we work aggressively to identify potential entry and attack surfaces before can use they can use them regularly and to ensure organizations can safely isolate themselves before a corporate data loss episode,” explains Ray Canzanese, Director of Threat Research at Netskope.

“The research shows that companies need to rethink security based on the reality of using cloud applications. They should favor a security architecture that provides context for apps, cloud services, and web user activity, and applies zero-trust controls to protect data wherever and however it is accessed ». 

Key Takeaways

  1. 97% of the cloud apps used in the company are “Shadow IT,” unmanaged and often freely adopted.
  2. Third-party app plugins pose serious data risks. 97% of Google Workspace users have authorized at least one third-party app access to their corporate Google account, potentially exposing data to third parties due to scopes like “View and manage your Google Drive files .”
  3. The rise of cloud environments exposed to the public creates opportunities for attackers. Over 35% of all workloads are exposed to the public Internet within AWS, Azure, and GCP, with RDP servers – a popular infiltration vector for attackers – exposed in 8.3% of workloads.
  4. Malware delivered via cloud apps continues to grow, reaching an all-time high of 68%. Cloud storage apps account for nearly 67% of cloud malware delivery, and malicious Office documents already account for 43% of all malware downloads.
  5. Employees attempt to filter significant amounts of work data before leaving their jobs. Departing employees upload three times as much data to personal applications in the last 30 days of work; 15% of that data originates from a corporate application instance or directly violates a corporate data policy. Individual instances of Google Drive and Microsoft OneDrive are the most popular targets.
techgogoal

TechGogoal updates all the Information from the levels of Technology, Business, Gadgets, Apps, Marketing, Social Networks, and other Trending topics of Innovative technology.

Recent Posts

Tips to Avoid Mistakes When Buying a Second hand Laptop

Buying a second hand laptop can be quite an quest, and there are many times…

4 days ago

Augmented Reality in Retail and Why You Need It in 2024

Augmented Reality is an immersive technology that enhances product presentation in retail by overlaying digital…

3 weeks ago

Most Important SEM Trends for 2025

When it comes to shopping, every user turns to Google at one point or another,…

3 weeks ago

Drawing:acotuuvra54= harry potter – Unlimited Magical Art

Drawing:acotuuvra54= harry potter is related to a Harry Potter character art; you can also call…

1 month ago

What are Long Tail Keywords in SEO Keyword Research

In this article, we explain what long-tail keywords are and why it is important to…

1 month ago

Optimize Advertising Campaigns with New Meta Updates

New Meta updates have arrived that will transform the way we manage and optimize advertising…

2 months ago